Blog
Business Continuity Plans – What Are They and Why Have Them?
The modern world of work is unpredictable. Our online presence is only growing and with it so is the risk of cyber attacks. Unfortunately, a
Understanding Cyber Threats – The Sources of Cyber Threats
In our previous articles we explored, what cyber threats are and the different types of attack that jeopardize your systems – we will now explore
Understanding Cyber Threats – The Types of Attack
In our previous article we explored, what cyber threats are and how in the modern world they are growing in commonality and severity. We also
Understanding Cyber Threats – What Are They?
The current modern age has made cyber attacks the number one threat to businesses across the globe – today you are more likely to get
Cybersecurity terminology you need to know
Do IT security terms like “phishing” and “intrusion protection” sound extremely foreign to you? If so, it’s time you familiarize yourself with these and other
SCAM ALERT: phishing scam uses Microsoft as lure
A recent scam led to at least one person being defrauded of more than $9,000USD in Canada. The crime was reported to police on Mar
Your business’s cybersecurity needs an MSP
With the prevalence of cyberattacks on companies of all sizes these days, businesses cannot afford to relegate cybersecurity to the bottom of their budget priorities.
Microsoft 365 features that prevent phishing
Over the years, Microsoft has built a reputation as a provider of powerful and intuitive tools that enhance efficiency and productivity. The company is also
Surefire ways to protect your email account
If you think your email is safe from hackers, think again. A lack of sufficient email security protocols can lead to data theft, unauthorized access
Cybersecurity tips for working remotely
Remote work policies have become a necessity not just because of the current coronavirus crisis, but also for the ways they improve a company’s bottom